COmmit 0cc698 added support for handling endian fixups in the event log code
but broke the binary log file in the process. Keep the endian code, but read
the event data from the actual event rather than from unallocated RAM.
Signed-off-by: Matthew Garrett
Cc: sta...@kernel.org
---
Should be
On Tue, Mar 1, 2016 at 4:03 PM, Jason Gunthorpe
wrote:
> https://git.kernel.org/cgit/linux/kernel/git/jmorris/linux-security.git/commit/drivers/char/tpm/tpm_eventlog.c?h=next&id=186d124f07da193a8f47e491af85cb695d415f2f
>
> Already on it's way to mainline.
Works for me.
--
tpms along with any additional
topics you'd like to discuss - and if you'd like to lead a short
discussion session, drop me an email with a description.
Thanks!
--
Matthew Garrett | mj...@srcf.ucam.org
--
Wha
#x27;s usually some number available
for people leading discussion topics at microconferences, but I don't
know for sure that that'd be possible.
--
Matthew Garrett | mj...@srcf.ucam.org
--
What NetFlow Anal
istribution
developers.
--
Matthew Garrett | mj...@srcf.ucam.org
--
What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
patterns at an interface-level. Reveals which users, apps, and protocols are
co
On Mon, Jun 06, 2016 at 09:18:55PM -0400, Mimi Zohar wrote:
> On Tue, 2016-06-07 at 01:38 +0100, Matthew Garrett wrote:
> > On Mon, Jun 06, 2016 at 08:35:55PM -0400, Mimi Zohar wrote:
> >
> > > Did you consider submitting this as an Linux Security Summit (LSS)
> > &g
ctical
If anyone is interested and *hasn't* registered for LPC yet, I have a
small number of passes available. Please get in touch with me directly
in the next few days and we'll try to figure something out.
--
Matthew Garrett |
out a more detailed report next
week.
--
Matthew Garrett | mj...@srcf.ucam.org
--
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel
went well last time. I could do with at least one
person to volunteer to co-chair in that case just in case disaster
strikes - anyone up for that?
--
Matthew Garrett | mj...@srcf.ucam.org
--
Check out the vibrant tech
I've thrown up a proposal draft at
http://wiki.linuxplumbersconf.org/2017:tpms - please add anything else
that might be worth talking about!
--
Matthew Garrett | mj...@srcf.ucam.org
--
Check out the vibrant
On Tue, Jun 06, 2017 at 08:14:58PM +0300, Jarkko Sakkinen wrote:
> On Mon, Jun 05, 2017 at 09:11:01PM +0100, Matthew Garrett wrote:
> > I've thrown up a proposal draft at
> > http://wiki.linuxplumbersconf.org/2017:tpms - please add anything else
> > that mi
lems and having enough people in the room to start
figuring out what the solutions should be - the format is typically some
short presentations coupled with discussion.
--
Matthew Garrett | mj...@srcf.ucam.org
--
Check
typically some
short presentations coupled with discussion.
--
Matthew Garrett | mj...@srcf.ucam.org
--
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http
On Thu, Sep 14, 2017 at 11:43 AM, Jarkko Sakkinen
wrote:
> On Mon, Sep 11, 2017 at 12:00:21PM +0200, Thiebaud Weksteen wrote:
>> With TPM 2.0 specification, the event logs may only be accessible by
>> calling an EFI Boot Service. Modify the EFI stub to copy the log area to
>> a new Linux-specific
On Wed, Jun 19, 2019 at 2:55 AM Ard Biesheuvel
wrote:
>
> (+ Jarkko, tpmdd, Matthew)
>
> On Sat, 15 Jun 2019 at 06:02, Hariprasad Kelam
> wrote:
> >
> > This patch fixes below warning
> >
> > drivers/firmware/efi/tpm.c:78:38: warning: passing argument 1 of
> > ‘tpm2_calc_event_log_size’ makes poi
On Thu, Jun 20, 2019 at 2:37 PM Jarkko Sakkinen
wrote:
> Right! OK, I squashed just the fix to the earlier patch. Master and
> next are updated. Can you take a peek of [1] and see if it looks
> legit given all the fuzz around these changes? Then I'm confident
> enough to do the 5.3 PR.
All looks
16 matches
Mail list logo